Fialka was a rotor cipher machine used by the USSR during the Cold War. This third part comes without a punchcard. Can you still break the machine?
Fialka was a rotor cipher machine used by the USSR during the Cold War. This second part challenges your understanding of the machine. Despite longer keys being used, can you still break the machine?
Fialka was a rotor cipher machine used by the USSR during the Cold War. This challenge gives you the opportunity to understand the machine and test your skills at breaking it.
During the Cold War, anyone could encrypt relatively securely with the PX-1000. To prevent this, the NSA added a backdoor in the successor model PX-1000cr. However, even the supposedly secure original version has weaknesses. Can you break the PX-1000?
Ready for the Elliptic Boogaloo? In this challenge, we dance on elliptic curves and try to forge digital signatures.
An English plaintext of length 4272 was encrypted with the Hutton cipher, a pen-and-paper cipher from 2018. The length of the two passwords is also known. Can you successfully perform a ciphertext-only attack?
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher from 2018. Can you crack the ciphertext?
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher from 2018. Can you crack the ciphertext?
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher that has baffled cryptographers since 2018. Can you reconstruct the keywords used?
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher that has baffled cryptographers since 2018. Can you crack the ciphertext?
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts.
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts.
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts.
The Syllabary cipher seems to be just another substitution cipher. This time, the table got mixed up. Is a solution even possible? Find it out!
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! All keys went missing...
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! But this time, the table is weird...
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! A key got missing...
The legendary Merkle-Hellman Knapsack cryptosystem can also be used for public-key encryption. Is the cryptosystem secure or can you crack the ciphertext?
The historical Hill cipher uses matrix-vector multiplications to encrypt blocks of letters. Can you find the inverse matrix and recover the plaintext?
A more difficult and even more interesting sequel to the "Alberti Challenge - Part 1". Will you manage to crack this puzzle this time as well?
This cipher is a new take on the well-known Vigenère cipher. It has been designed to fix its "brother's" weaknesses. Can you find another weakness?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the last challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and parts of the corresponding plaintext. Can you find the MU wheel patterns and decrypt the ciphertext?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the twelfth challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and parts of the corresponding plaintext. Can you find the PSI wheel patterns and decrypt the ciphertext?
The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 270 and 120 characters.
The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 320 and 120 characters.
The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 270 and 120 characters.
The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 320 and 120 characters. Update June 2021: We replaced the used key (and this changed the ciphertext) since a part of the previous used key was leaked in the newest SIGABA template of CrypTool 2.
The Wheatstone Cryptograph is a simple device that resembles a clock with two hands. For each hand there is a ring of symbols. In this challenge the key is a random permutation of the english alphabet. Are you able to decrypt the given ciphertext?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the eleventh challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and the corresponding plaintext. Can you find the wheel patterns?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the tenth challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and the corresponding plaintext. Can you find the wheel patterns? Update January 2021: The starting positions for the CHI wheels were added.
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the ninth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI wheels. Can you find the starting positions for both the MU and PSI wheels and decrypt the ciphertext?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the eighth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI and PSI wheels. Can you find the starting positions for the MU wheels and decrypt the ciphertext?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the seventh challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI and MU wheels. Can you find the starting positions for the PSI wheels and decrypt the ciphertext?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the sixth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for all five CHI wheels are known. Can you find the starting positions for the five CHI wheels?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the fifth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for CHI1 and CHI2 wheels are known. Can you find the starting positions for CHI1 and CHI2?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the fourth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for CHI1 and CHI2 wheels are known. Can you find the starting positions for CHI1 and CHI2?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the third challenge in a series of 13 level-2 challenges with the SZ42. Here, you are provided with 2 in-depth ciphertexts and a limitation is used. Can you recover the plaintexts?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the second challenge in a series of 13 level-2 challenges with the SZ42. Here, you are provided with 4 in-depth ciphertexts and a limitation is used. Can you recover the plaintexts?
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the first challenge in a series of 13 Level-2 challenges with the SZ42. Here, you are provided with 8 in-depth ciphertexts. Can you recover the plaintexts?
This is part 3 of the challenge series about lattice-based cryptography schemes. This challenge introduces an encryption scheme which uses systems of linear equations. Can you decrypt a message without knowing the key?